Who needs advanced malware when you can take advantage of a bunch of OSS tools and free cloud services to compromise your target?
Автор: Nate Nelson, Contributing Writer
Kansas Water Plant Pivots to Analog After Cyber Event
A water treatment facility in a small city took serious precautions to prevent any bad outcomes from a hazy cyber incident.
Meet UNC1860: Iran’s Low-Key Access Broker for State Hackers
The group has used more than 30 custom tools to target high-value government and telecommunications organizations on behalf of Iranian intelligence services, researchers say.
Citrine Sleet Poisons PyPI Packages With Mac & Linux Malware
A North Korean advanced persistent threat (APT) actor (aka Gleaming Pisces) tried to sneak simple backdoors into public software packages.
Vice Society Pivots to Inc Ransomware in Healthcare Attack
Inc ransomware — one of the most popular among cybercriminals today — meets healthcare, the industry sector most targeted by RaaS.
Phishing Espionage Attack Targets US-Taiwan Defense Conference
Hackers sent a convincing lure document, but after 20 years of similar attacks, the target organization was well prepared.
Infostealers: An Early Warning for Ransomware Attacks
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks?
Infostealers: An Early Warning for Ransomware Attacks
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks?
Zero-Click RCE Bug in macOS Calendar Exposes iCloud Data
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.
Ukraine, Gaza Wars Inspire DDoS Surge Against Finservs
Hacktivists love to target financial services companies, and their attacks are growing both larger and longer.